Bug 101572

Summary: kernel ptrace bug
Product: Red Hat Enterprise Linux 2.1 Reporter: Milan Brabec <milan.brabec>
Component: kernelAssignee: Larry Woodman <lwoodman>
Status: CLOSED NOTABUG QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 2.1CC: petr.sava, riel
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: i686   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2003-08-04 15:23:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Milan Brabec 2003-08-04 08:13:10 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.4) Gecko/20030624

Description of problem:
The latest kernel from RHEN updates (kernel 2.4.9-e.25.smp) is still vulnerable
to ptrace exploit (from march 2003), available e.g. from
http://hysteria.sk/sd/p.c. We have checked that some form of ptrace patch is
included in the src.rpm package.

Version-Release number of selected component (if applicable):
kernel 2.4.9-e.25.smp

How reproducible:
Always

Steps to Reproduce:
1. login as normal user 
2. compile ptrace_exploit.c
3. run ./ptrace_exploit

    

Actual Results:  you've got root's shell

Expected Results:  ptrace exploit shouldn't get root's priviledges 

Additional info:

Comment 1 Arjan van de Ven 2003-08-04 08:28:51 UTC
be careful; if you tested this exploit before you updated the kernel as well, it
will have made itself setuid root..... so it appears to have succeeded.
Is this the case ?

Comment 2 Milan Brabec 2003-08-04 08:50:13 UTC
Yes, we have had the binary setuid root. Sorry.